Eight Friends Are Enough: Social Graph Approximation via Public Listings

Size: px
Start display at page:

Download "Eight Friends Are Enough: Social Graph Approximation via Public Listings"

Transcription

1 Eight Friends Are Enough: Social Graph Approximation via Public Listings ABSTRACT Joseph Bonneau Fran Stajano The popular social networing website Faceboo exposes a public view of user profiles to search engines which includes eight of the user s friendship lins. We examine what interesting properties of the complete social graph can be inferred from this public view. In experiments on real social networ data, we were able to accurately approximate the degree and centrality of nodes, compute small dominating sets, find short paths between users, and detect community structure. This wor demonstrates that it is difficult to safely reveal limited information about a social networ. Categories and Subject Descriptors K.4.1 [Computers and Society]: Public Policy Issues Privacy; E.1 [Data Structures]: Graphs and networs; F.2.1 [Analysis of Algorithms and Problem Complexity]: Numerical Algorithms and Problems; K.6.5 [Management of Computing and Information Systems]: Security and Protection General Terms Security, Algorithms, Experimentation, Measurement, Theory, Legal Aspects Keywords Social networs, Privacy, Web crawling, Data breaches, Graph theory 1. INTRODUCTION The proliferation of online social networing services has entrusted massive silos of sensitive personal information to social networ operators. Privacy concerns have attracted Permission to mae digital or hard copies of all or part of this wor for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. To copy otherwise, to republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. SNS 09 Nuremberg, Germany Copyright 2009 ACM $5.00. Jonathan Anderson jra40@cl.cam.ac.u Ross Anderson rja40@cl.cam.ac.u considerable attention from the media, privacy advocates and the research community. Most of the focus has been on personal data privacy: researchers and operators have attempted to fine-tune access control mechanisms to prevent the accidental leaage of embarrassing or incriminating information to third parties. A less studied problem is that of social graph privacy: preventing data aggregators from reconstructing large portions of the social graph, composed of users and their friendship lins. Knowing who a person s friends are is valuable information to mareters, employers, credit rating agencies, insurers, spammers, phishers, police, and intelligence agencies, but protecting the social graph is more difficult than protecting personal data. Personal data privacy can be managed individually by users, while information about a user s place in the social graph can be revealed by any of the user s friends. 1.1 Faceboo and Public Listings Faceboo is the world s largest social networ, claiming over 175 million active users, maing it an interesting case study for privacy. Compared to other social networing platforms, Faceboo is nown for having relatively accurate user profiles, as people primarily use Faceboo to represent their real-world persona [10]. Thus, Faceboo is often at the forefront of criticism about online privacy [2, 17]. In September 2007, Faceboo started maing public search listings available to those not logged in to the site an example is shown in Figure 1. These listings are designed to encourage visitors to join by showcasing that many of their friends are already members. Originally, public listings included a user s name, photograph, and 10 friends. Showing a new random set of friends on each request is clearly a privacy issue, as this allows a web spider to repeatedly fetch a user s page until it has viewed all of that user s friends 1. In January 2009, public listings were reduced to 8 friends, and the selection of users now appears to be a deterministic function of the requestin IP address 2. 1 Retrieving n friends by repeatedly fetching a random sample of size is an instance of the coupon collector s problem. It will tae an average of n Hn = Θ( n log n) queries to retrieve the complete set of friends. A set of 100 friends, for example, would require 65 queries to retrieve with = 8. 2 Using the anonymity networ Tor, we were able retrieve dif- 1

2 Networ #Users Mean d Median d Max d Stanford 15, ,246 Harvard 18, ,213 Table 1: Summary of Datasets used. d = degree Figure 1: An author s public Faceboo profile Faceboo has also added public listings for groups, listing 8 members in a similar fashion. Critically, public listings are designed to be indexed by search engines, and are not defended technically against spidering. Members-only portions of social networs, in contrast, are typically defended by rate-limiting or legally by terms of use. We have experimentally confirme the ease of collecting public listings, writing a spidering script which retrieved 250,000 listings per day from a destop computer. This suggests roughly 800 machine-days of effort are required to retrieve the public listing of every user on Faceboo, easily within the ability of a serious aggregator. Thus the complete collection of public listings can be considered available to motivated parties. 1.2 Privacy Implications Our goal is to analyse the privacy implications of easily available public listings. The existence of friendship information in public listings is troublesome in that it is not mentioned in Faceboo s privacy policy, which states only that: Your name, networ names, and profile picture thumbnail will be made available to third party search engines [1]. Furthermore, public listings are shown by default for all users. Experimenting with users in the Cambridge networ, we have found that fewer than 1% of users opt out. We feel this reflects a combination of user ignorance and poorly designed privacy controls, as most users don t want public listings the primary purpose is to encourage new members to join. Users who joined prior to the deployment of public listings may be unaware that the feature exists, as it is never encountered by members of the site whose browsers store cooies for automatic log-in. Leaing friendship information leads to obvious privacy concerns. Social phishing attacs, in which phishing s are forged to appear to come from a victim s friend, have been shown to be significantly more effective than traditional ferent sets of friends for the same user by sending requests from different IP addresses around the globe. We noticed a correlation between the set of friends shown and the geographic location of the requesting IP address. We suspect this is a mareting feature and not a security feature showing a visitor a group of nearby people maes the site more appealing. cold phishing [12]. Private information can be inferred directly from one s friend list if, for example, it contains multiple friends with Icelandic names. A friend list may also be checed against data retrieved from other sources, such as nown supporters of a fringe political party [19]. In this wor though, we evaluate how much social graph structure is leaed by public search listings. While we are motivated by the question of what data aggregators can extract from Faceboo, we consider the general question of what interesting properties of a graph one can compute from a limited view. We start with an undirected social graph G =< V, E >, where V is the set of vertices (users) and E is the set of edges (friendships). We produce a publicly sampled graph G =< V, E >, where E E is produced by randomly choosing outgoing friendship edges for each node v V. We then compute some function of interest f(g) and attempt to approximate it using another function f approx (G ). If f (G) f approx (G ), we say that the public view of the graph leas the property calculated by f. As, all information leas, so we are most concerned with low values of such as the current Faceboo value = 8. It is important to note that we assume E is a uniformly random sample of E. This may not be the case if Faceboo is specifically showing friends for mareting purposes. An interesting question for future wor is if there are public display strategies which would mae it harder to approximate useful functions of the graph. 2. EXPERIMENTAL DATA In order to obtain a complete subgraph to perform experiments on, we crawled data from a large social-networ using a special application to repeatedly query user data using the networ s developer API. On the social networ in question, we found that more than 99% of users had their information exposed to our application, maing this approach superior to crawling all profiles visible to a public networ, which is typically only 70-90% [14]. We crawled two sub-networs consisting of students from Stanford and Harvard universities, summarised in Table 1. We note that our crawling method is impractical for crawling significant portions of the graph, because we were subject to rate-limiting and the number of friendship queries required was O(n 2 ) as n, the number of users crawled, increased. Crawling public listings, as search engines are encouraged to do, is a much easier tas. 3. STATISTICS We studied five common graph metrics vertex degree, dominating sets, betweenness centrality, shortest paths, and community detection and found that even with a limited public view, an attacer is able to approximate them all with some success. 3.1 Degree Information about the degree d of nodes in the networ is exposed in the sampled graph, particularly for low-degree 2

3 nodes. This is not surprising, because nodes with d < must be shown with fewer than lins in their public listing, leaing their precise degree. For most social networs, however, finding the set of users with few friends is less interesting than finding the most popular users in the networ, who are useful for mareting purposes. Degree information is leaed for users with d because they will liely be displayed in some of their friends listings, meaning that there will be edges for most nodes in the sampled graph. We can consider the sampled graph to be a directed graph with edges originating from the user whose public listing they were found in. The out-degree d out(n) of a node n is the number of edges learned from its public listing, and the in-degree d in(n) is the number of edges learned from other public friend listings which include n. Note that we always have d out(n), but for a high degree node in the complete graph, we expect d in(n) >. We can mae a naive approximation of n s degree in the complete graph: d (n) max[d out(n), d in(n) d ] (1) where d is the average degree of all nodes in the complete graph (we assume this can be found from public statistics). This method wors because, for a node n with d(n) friends, n will show up in each friend m s listings with probability d(m). Since we don t now d(m), we can approximate with the average degree for the complete graph. This approximation, however, has an intrinsic bias, as nodes with many relatively low-degree friends will have an artificially high estimated degree. In a sampled graph, it is more meaningful for a node to have in-edges from a higher-degree node, conceptually similar to the PageRan algorithm [6]. Thus, we can improve our estimates by implementing an iterative algorithm: first initialise all estimates d 0(n) to the naive estimate of equation 1, and then iteratively update: d i(n) max[d out(n), X m in-sample(n) d i 1(m) ] (2) In order to eep the degree estimates bounded, it is necessary to normalise after each iteration. We found it wors well to force the average of all estimated degrees to be our estimated average d for the complete graph. To evaluate the performance of this approach, we define a cumulative degree function D(x), which is the sum of the degrees of the x highest-degree nodes. This is motivated by the liely use of degree information, to locate a set of very high-degree nodes in a networ. In in Figure 2, there is a comparison of the growth of D(x) when selecting the highest degree nodes given complete graph nowledge against our naive and iterated estimation algorithms. We also plot the growth of D(x) if nodes are selected uniformly at random, which is the best possible approach with no graph information. With = 8, the iterative estimation method wors very well; for the Harvard data set the highest-degree 1,000 nodes identified by this method have a cumulative degree of 407,746, compared with 452,886 using the complete graph, maing our approximation 90% of optimal. We similarly found 89% accuracy in the Stanford networ. 3.2 Dominating Sets A more powerful concept than simply finding high-degree Figure 2: Degree estimation methods nodes is to compute a minimal dominating set for the graph. A dominating set is a set of nodes N, such that its dominated set N friends(n) is the complete set of users V. In the case of a social networ, this is a set of people who are, collectively, friends with every person in the networ. Mareters can target a small dominating set to indirectly reach the entire networ. If an attacer can compromise a small dominating set of accounts, then the entire networ is visible. Even given the complete graph, computing the minimum dominating set is an NP-complete problem [13]. The simple strategy of picing the highest-degree nodes can perform poorly in social networs, as many high-degree users with overlapping groups of friends will be selected which add relatively little coverage. However, a greedy algorithm which repeatedly selects the node which brings the most new nodes into the dominated set has been shown to perform well in practice [7]. To evaluate this greedy approach, we measured the growth of the dominated set as additional nodes are added to the dominating set, if nodes are selected using the complete graph or the sampled graph. The greedy algorithm performs very well given the sampled view. In Figure 3 we compared these two selection strategies against a degree selection strategy of always picing the next highest-degree node (given complete graph nowledge). The greedy algorithm outperforms this approach even with only sampled data, demonstrating that significant networ information is leaed beyond an approximation of degrees 3. Our experiments showed that very small sets exist which dominate most of the networ, followed by a long tail of diminishing returns to dominate the entire networ, consistent with previous research [9]. With complete graph nowledge, we found a set of 100 nodes which dominate 65.2% of the Harvard networ, while we were able to find a set of 100 nodes giving 62.1% coverage using only the sampled graph, 3 In fact, we were surprised to find that selecting the highestdegree nodes based on our naive degree-estimates from the sampled graph outperformed selecting based on actual degree! This is because a bias in favor of nodes with low-degree friends is useful for finding a dominating set, as the graph s fringes are reached more quicly. 3

4 Figure 3: Dominating set estimation Figure 4: Message interception for 95% accuracy. Similarly, for Stanford, our computed 100-node dominating set had 94% of the optimal coverage. 3.3 Centrality and Message Interception Another important metric used in the analysis of social networs is centrality, which is a measure of the importance of members of the networ based on their position in the graph. We use the betweenness centrality metric, for which an efficient algorithm is described in [5]. Betweenness centrality is defined as: C B (v) = X s v t V σ st (v) σ st (3) where σ st is the number of shortest paths from node s to node t and σ st (v) is the number of such paths which contain the node v. Thus, the higher a node s betweenness centrality, the more communication paths it is a part of. A node with high betweenness centrality, therefore, is one which could intercept many messages travelling through the networ. We simulated such interception occurring on the Stanford sub-networ to determine the probability that an attacer controlling N nodes could intercept a message sent from any node to any other node in the networ via shortestpath social routes. The nodes designated as compromised are selected according to one of three policies: maximum centrality, maximum centrality for a sampled graph with = 8, or random selection. 4 shows that, while randomly selecting nodes to compromise leads to a linear increase in intercepted traffic, a selective targeting of highly central nodes yields much better results. After compromising 10% of nodes in this sub-networ, an attacer could intercept 15.2% of messages if she used random selection, but using centrality to direct the choice of nodes, the attacer can intercept as much as 51.9% of messages. Even if the attacer uses only the information available from a = 8 public listing, she can still successfully intercept 49.8% of all messages just 4% less than she could do with full centrality information. 3.4 Shortest Paths We tested the extent that the small world property is Figure 5: Reachable nodes maintained in a sampled graph by computing the minimum path length between every pair of nodes, using the Floyd- Warshall shortest path algorithm [11]. As this algorithm has a complexity of O ` V 3, where V is the set of vertices in a graph, we only calculated shortest paths a subset of our example data. Within the 2,000 most popular Stanford users, the minimum-length shortest path was a single edge and the maximum-length path was just three edges. Figure 5 shows the effect of limiting friendship nowledge on reachability of nodes in the graph. The maximum-length shortest path increases from 3 to 7 as we reduce visible friendships to 2 per person, but the graph remains fully connected. The average path length for Stanford was 1.94 edges, and with = 8, it increased to just Community Detection Given a complete graph, it is possible to automatically cluster the users into highly-connected subgroups which signify natural social groupings. Community structure in social graphs could be used to maret products that other members of one s social clique have purchased, or to identify dis- 4

5 strategies for placing a small set of nodes under surveillance to gain coverage of a larger networ, similar to our calculation of dominating sets. Related to our problem of limiting the usefulness of observable graph data is anonymising a social networ for research purposes. It has been shown that, due to the unique structure of groups withing a social graph, it is often easy to de-anonymise a social graph by correlating it with nown data [4]. Figure 6: Community Detection sident groups, among other applications. For our purposes, we will use attempt find communities with maximal modularity [16], a clustering metric for which efficient algorithms can partition realistically-sized social graphs with thousands of nodes. Modularity is defined to be the number of edges which exist within communities beyond those that would be expected to occur randomly: Q = 1 2m X v,w» A vw d(v)d(w) 2m where m is the total number of edges in the graph, and A vw = 1 if and only if v and w are connected. We implemented the greedy algorithm for community detection in large graphs described in [8]. The results on our sample graph were striing, as shown in Figure 6. With a sampling parameter of = 8, we were able to divide the graph into communities nearly as well as using complete graph nowledge. Using sampled data, we divided the graph into 18,150 communities with a modularity of 0.341, 92% as high as the optimal 18,205 communities with a modularity of The algorithm produced a slightly different set of communities using the sampled graph, because a well-connected social networ lie a college campus contains many overlapping communities, but using modularity as our metric, the communities identified were almost as significant. Community detection wored nearly as well with =5, but performance deteriorated significantly for =2 and below. 4. RELATED WORK Graph theory is a well-studied mathematical field; a good overview is available in [3]. Sociologists have long been interested in applying graph theory to social networs, the definitive wor is [18]. Approximating information from a social graph when presented with incomplete nowledge, however is far less studied. The closest example we could find in the literature was a study which evaluated community detection given only the edges from a small subset of nodes [15]. This wor used a different sampling strategy, however, and only aimed to classify nodes into one of two communities in a simulated graph. Another set of experiments [9] examined (4) 5. CONCLUSIONS We have examined the difficulty of computing graph statistics given a random sample of edges from each node, and found that many interesting properties can be accurately approximated. This has disturbing implications for online privacy, since leaing graph information enables transitive privacy loss: insecure friends profiles can be correlated to a user with a private profile. Social networ operators should be aware of the importance of protecting not just user profile data, but the structure of the social graph. In particular, they shouldn t assist data aggregators by giving away public listings. Acnowledgements We would lie to than George Danezis, Claudia Diaz, Eio Yonei, and Joshua Batson, as well as anonymous reviewers, for helpful discussions about this research. 6. REFERENCES [1] Faceboo privacy policy. (2009). [2] Acquisti, A., and Gross, R. Imagined Communities: Awareness, Information Sharing, and Privacy on the Faceboo. In Privacy Enhancing Technologies LNCS 4258 (2006), Springer Berlin / Heildelberg, pp [3] Albert, R., and Barabási, A.-L. Statistical mechanics of complex networs. Rev. Mod. Phys. 74, 1 (Jan 2002), [4] Bacstrom, L., Dwor, C., and Kleinberg, J. Wherefore art thou r3579x?: anonymized social networs, hidden patterns, and structural steganography. In WWW 07: Proceedings of the 16th international conference on World Wide Web (New Yor, NY, USA, 2007), ACM, pp [5] Brandes, U. A Faster Algorithm for Betweenness Centrality. Journal of Mathematical Sociology 25, 2 (2001), [6] Brin, S., and Page, L. The anatomy of a large-scale hypertextual web search engine. In Seventh International World-Wide Web Conference (WWW 1998) (1998). [7] Chvatal, V. A Greedy Heuristic for the Set-Covering Problem. Mathematics of Operations Research 4, 3 (1979), [8] Clauset, A., Newman, M. E. J., and Moore, C. Finding community structure in very large networs. Physical Review E 70, 6 (Dec 2004), [9] Danezis, G., and Wittneben, B. The economics of mass surveillance and the questionable value of anonymous communications. WEIS: Worshop on the Economics of Information Security (2006). 5

6 [10] Dwyer, C., Hiltz, S. R., and Passerini, K. Trust and privacy concern within social networing sites: A comparison of faceboo and myspace. America s Conference on Information Systems (2007). [11] Floyd, R. W. Algorithm 97: Shortest path. Communications of the ACM 5, 6 (1962), 345. [12] Jagatic, T. N., Johnson, N. A., Jaobsson, M., and Menczer, F. Social phishing. Commun. ACM 50, 10 (2007), [13] Karp, R. Reducibility Among Combinatorial Problems. Complexity of Computer Computations (1972). [14] Krishnamurthy, B., and Wills, C. E. Characterizing Privacy in Online Social Networs. In Worshop on Online Social Networs WOSN 2008 (2008), pp [15] Nagaraja, S. The economics of covert community detection and hiding. WEIS: Worshop on the Economics of Information Security (2008). [16] Newman, M. E. J., and Girvan, M. Finding and evaluating community structure in networs. Physical Review E 69 (2004), [17] Rosenblum, D. What Anyone Can Know: The Privacy Riss of Social Networing Sites. IEEE Security & Privacy Magazine 5, 3 (2007), 40. [18] Wasserman, S., and Faust, K. Social Networ Analysis. Cambridge University Press, [19] Xu, W., Zhou, X., and Li, L. Inferring privacy information via social relations. International Conference on Data Engineering (2008). 6

An Alternative Web Search Strategy? Abstract

An Alternative Web Search Strategy? Abstract An Alternative Web Search Strategy? V.-H. Winterer, Rechenzentrum Universität Freiburg (Dated: November 2007) Abstract We propose an alternative Web search strategy taking advantage of the knowledge on

More information

Big Data Analytics of Multi-Relationship Online Social Network Based on Multi-Subnet Composited Complex Network

Big Data Analytics of Multi-Relationship Online Social Network Based on Multi-Subnet Composited Complex Network , pp.273-284 http://dx.doi.org/10.14257/ijdta.2015.8.5.24 Big Data Analytics of Multi-Relationship Online Social Network Based on Multi-Subnet Composited Complex Network Gengxin Sun 1, Sheng Bin 2 and

More information

Algorithms for representing network centrality, groups and density and clustered graph representation

Algorithms for representing network centrality, groups and density and clustered graph representation COSIN IST 2001 33555 COevolution and Self-organization In dynamical Networks Algorithms for representing network centrality, groups and density and clustered graph representation Deliverable Number: D06

More information

Web Hosting Service Level Agreements

Web Hosting Service Level Agreements Chapter 5 Web Hosting Service Level Agreements Alan King (Mentor) 1, Mehmet Begen, Monica Cojocaru 3, Ellen Fowler, Yashar Ganjali 4, Judy Lai 5, Taejin Lee 6, Carmeliza Navasca 7, Daniel Ryan Report prepared

More information

InfiniteGraph: The Distributed Graph Database

InfiniteGraph: The Distributed Graph Database A Performance and Distributed Performance Benchmark of InfiniteGraph and a Leading Open Source Graph Database Using Synthetic Data Objectivity, Inc. 640 West California Ave. Suite 240 Sunnyvale, CA 94086

More information

Graph Mining and Social Network Analysis

Graph Mining and Social Network Analysis Graph Mining and Social Network Analysis Data Mining and Text Mining (UIC 583 @ Politecnico di Milano) References Jiawei Han and Micheline Kamber, "Data Mining: Concepts and Techniques", The Morgan Kaufmann

More information

USING SPECTRAL RADIUS RATIO FOR NODE DEGREE TO ANALYZE THE EVOLUTION OF SCALE- FREE NETWORKS AND SMALL-WORLD NETWORKS

USING SPECTRAL RADIUS RATIO FOR NODE DEGREE TO ANALYZE THE EVOLUTION OF SCALE- FREE NETWORKS AND SMALL-WORLD NETWORKS USING SPECTRAL RADIUS RATIO FOR NODE DEGREE TO ANALYZE THE EVOLUTION OF SCALE- FREE NETWORKS AND SMALL-WORLD NETWORKS Natarajan Meghanathan Jackson State University, 1400 Lynch St, Jackson, MS, USA natarajan.meghanathan@jsums.edu

More information

KEYWORD SEARCH OVER PROBABILISTIC RDF GRAPHS

KEYWORD SEARCH OVER PROBABILISTIC RDF GRAPHS ABSTRACT KEYWORD SEARCH OVER PROBABILISTIC RDF GRAPHS In many real applications, RDF (Resource Description Framework) has been widely used as a W3C standard to describe data in the Semantic Web. In practice,

More information

RANKING WEB PAGES RELEVANT TO SEARCH KEYWORDS

RANKING WEB PAGES RELEVANT TO SEARCH KEYWORDS ISBN: 978-972-8924-93-5 2009 IADIS RANKING WEB PAGES RELEVANT TO SEARCH KEYWORDS Ben Choi & Sumit Tyagi Computer Science, Louisiana Tech University, USA ABSTRACT In this paper we propose new methods for

More information

A Measurement-driven Analysis of Information Propagation in the Flickr Social Network

A Measurement-driven Analysis of Information Propagation in the Flickr Social Network A Measurement-driven Analysis of Information Propagation in the Flickr Social Network Meeyoung Cha MPI-SWS Campus E1 4 Saarbrücken, Germany mcha@mpi-sws.org Alan Mislove MPI-SWS Campus E1 4 Saarbrücken,

More information

Measurement and Analysis of Online Social Networks

Measurement and Analysis of Online Social Networks Measurement and Analysis of Online Social Networks Alan Mislove Massimiliano Marcon Krishna P. Gummadi Peter Druschel Bobby Bhattacharjee Max Planck Institute for Software Systems Rice University University

More information

Attacking Anonymized Social Network

Attacking Anonymized Social Network Attacking Anonymized Social Network From: Wherefore Art Thou RX3579X? Anonymized Social Networks, Hidden Patterns, and Structural Steganography Presented By: Machigar Ongtang (Ongtang@cse.psu.edu ) Social

More information

The Impact of YouTube Recommendation System on Video Views

The Impact of YouTube Recommendation System on Video Views The Impact of YouTube Recommendation System on Video Views Renjie Zhou, Samamon Khemmarat, Lixin Gao College of Computer Science and Technology Department of Electrical and Computer Engineering Harbin

More information

Practical Graph Mining with R. 5. Link Analysis

Practical Graph Mining with R. 5. Link Analysis Practical Graph Mining with R 5. Link Analysis Outline Link Analysis Concepts Metrics for Analyzing Networks PageRank HITS Link Prediction 2 Link Analysis Concepts Link A relationship between two entities

More information

Evaluation of a New Method for Measuring the Internet Degree Distribution: Simulation Results

Evaluation of a New Method for Measuring the Internet Degree Distribution: Simulation Results Evaluation of a New Method for Measuring the Internet Distribution: Simulation Results Christophe Crespelle and Fabien Tarissan LIP6 CNRS and Université Pierre et Marie Curie Paris 6 4 avenue du président

More information

An ACO Approach to Solve a Variant of TSP

An ACO Approach to Solve a Variant of TSP An ACO Approach to Solve a Variant of TSP Bharat V. Chawda, Nitesh M. Sureja Abstract This study is an investigation on the application of Ant Colony Optimization to a variant of TSP. This paper presents

More information

Social Authentication: Harder than it Looks

Social Authentication: Harder than it Looks Social Authentication: Harder than it Looks Hyoungshick Kim, John Tang, and Ross Anderson Computer Laboratory, University of Cambridge, UK {hk33, jkt27, rja4}@cam.ac.uk Abstract. A number of web service

More information

Managing Incompleteness, Complexity and Scale in Big Data

Managing Incompleteness, Complexity and Scale in Big Data Managing Incompleteness, Complexity and Scale in Big Data Nick Duffield Electrical and Computer Engineering Texas A&M University http://nickduffield.net/work Three Challenges for Big Data Complexity Problem:

More information

A scalable multilevel algorithm for graph clustering and community structure detection

A scalable multilevel algorithm for graph clustering and community structure detection A scalable multilevel algorithm for graph clustering and community structure detection Hristo N. Djidjev 1 Los Alamos National Laboratory, Los Alamos, NM 87545 Abstract. One of the most useful measures

More information

Graph Theory and Complex Networks: An Introduction. Chapter 08: Computer networks

Graph Theory and Complex Networks: An Introduction. Chapter 08: Computer networks Graph Theory and Complex Networks: An Introduction Maarten van Steen VU Amsterdam, Dept. Computer Science Room R4.20, steen@cs.vu.nl Chapter 08: Computer networks Version: March 3, 2011 2 / 53 Contents

More information

Social Networs - A Review of alex hypothesis

Social Networs - A Review of alex hypothesis Mining Social Networs Using Heat Diffusion Processes for Mareting Candidates Selection Hao Ma, Haixuan Yang, Michael R. Lyu and Irwin King Dept. of Computer Science and Engineering The Chinese University

More information

Graph Security Testing

Graph Security Testing JOURNAL OF APPLIED COMPUTER SCIENCE Vol. 23 No. 1 (2015), pp. 29-45 Graph Security Testing Tomasz Gieniusz 1, Robert Lewoń 1, Michał Małafiejski 1 1 Gdańsk University of Technology, Poland Department of

More information

A Study of Local Optima in the Biobjective Travelling Salesman Problem

A Study of Local Optima in the Biobjective Travelling Salesman Problem A Study of Local Optima in the Biobjective Travelling Salesman Problem Luis Paquete, Marco Chiarandini and Thomas Stützle FG Intellektik, Technische Universität Darmstadt, Alexanderstr. 10, Darmstadt,

More information

Application of Adaptive Probing for Fault Diagnosis in Computer Networks 1

Application of Adaptive Probing for Fault Diagnosis in Computer Networks 1 Application of Adaptive Probing for Fault Diagnosis in Computer Networks 1 Maitreya Natu Dept. of Computer and Information Sciences University of Delaware, Newark, DE, USA, 19716 Email: natu@cis.udel.edu

More information

Text Mining Approach for Big Data Analysis Using Clustering and Classification Methodologies

Text Mining Approach for Big Data Analysis Using Clustering and Classification Methodologies Text Mining Approach for Big Data Analysis Using Clustering and Classification Methodologies Somesh S Chavadi 1, Dr. Asha T 2 1 PG Student, 2 Professor, Department of Computer Science and Engineering,

More information

Social Network Mining

Social Network Mining Social Network Mining Data Mining November 11, 2013 Frank Takes (ftakes@liacs.nl) LIACS, Universiteit Leiden Overview Social Network Analysis Graph Mining Online Social Networks Friendship Graph Semantics

More information

Community Detection Proseminar - Elementary Data Mining Techniques by Simon Grätzer

Community Detection Proseminar - Elementary Data Mining Techniques by Simon Grätzer Community Detection Proseminar - Elementary Data Mining Techniques by Simon Grätzer 1 Content What is Community Detection? Motivation Defining a community Methods to find communities Overlapping communities

More information

A Brief Survey on Anonymization Techniques for Privacy Preserving Publishing of Social Network Data

A Brief Survey on Anonymization Techniques for Privacy Preserving Publishing of Social Network Data A Brief Survey on Anonymization Techniques for Privacy Preserving Publishing of Social Network Data Bin Zhou School of Computing Science Simon Fraser University, Canada bzhou@cs.sfu.ca Jian Pei School

More information

Detecting Denial of Service Attacks in Tor

Detecting Denial of Service Attacks in Tor Detecting Denial of Service Attacks in Tor Norman Danner, Danny Krizanc, and Marc Liberatore Department of Mathematics and Computer Science Wesleyan University Middletown, CT 06459 USA Abstract. Tor is

More information

Graphs over Time Densification Laws, Shrinking Diameters and Possible Explanations

Graphs over Time Densification Laws, Shrinking Diameters and Possible Explanations Graphs over Time Densification Laws, Shrinking Diameters and Possible Explanations Jurij Leskovec, CMU Jon Kleinberg, Cornell Christos Faloutsos, CMU 1 Introduction What can we do with graphs? What patterns

More information

Link Prediction in Social Networks

Link Prediction in Social Networks CS378 Data Mining Final Project Report Dustin Ho : dsh544 Eric Shrewsberry : eas2389 Link Prediction in Social Networks 1. Introduction Social networks are becoming increasingly more prevalent in the daily

More information

Differentially Private Analysis of

Differentially Private Analysis of Title: Name: Affil./Addr. Keywords: SumOriWork: Differentially Private Analysis of Graphs Sofya Raskhodnikova, Adam Smith Pennsylvania State University Graphs, privacy, subgraph counts, degree distribution

More information

Scientific Collaboration Networks in China s System Engineering Subject

Scientific Collaboration Networks in China s System Engineering Subject , pp.31-40 http://dx.doi.org/10.14257/ijunesst.2013.6.6.04 Scientific Collaboration Networks in China s System Engineering Subject Sen Wu 1, Jiaye Wang 1,*, Xiaodong Feng 1 and Dan Lu 1 1 Dongling School

More information

Expanding the CASEsim Framework to Facilitate Load Balancing of Social Network Simulations

Expanding the CASEsim Framework to Facilitate Load Balancing of Social Network Simulations Expanding the CASEsim Framework to Facilitate Load Balancing of Social Network Simulations Amara Keller, Martin Kelly, Aaron Todd 4 June 2010 Abstract This research has two components, both involving the

More information

SIP Service Providers and The Spam Problem

SIP Service Providers and The Spam Problem SIP Service Providers and The Spam Problem Y. Rebahi, D. Sisalem Fraunhofer Institut Fokus Kaiserin-Augusta-Allee 1 10589 Berlin, Germany {rebahi, sisalem}@fokus.fraunhofer.de Abstract The Session Initiation

More information

Ranking on Data Manifolds

Ranking on Data Manifolds Ranking on Data Manifolds Dengyong Zhou, Jason Weston, Arthur Gretton, Olivier Bousquet, and Bernhard Schölkopf Max Planck Institute for Biological Cybernetics, 72076 Tuebingen, Germany {firstname.secondname

More information

On the k-anonymization of Time-varying and Multi-layer Social Graphs

On the k-anonymization of Time-varying and Multi-layer Social Graphs On the -Anonymization of Time-varying and Multi-layer Social Graphs Luca Rossi School of Computer Science University of Birmingham United Kingdom l.rossi@cs.bham.ac.u Mirco Musolesi School of Computer

More information

Cloud Computing Environments Parallel Data Mining Policy Research

Cloud Computing Environments Parallel Data Mining Policy Research , pp. 135-144 http://dx.doi.org/10.14257/ijgdc.2015.8.4.13 Cloud Computing Environments Parallel Data Mining Policy Research Wenwu Lian, Xiaoshu Zhu, Jie Zhang and Shangfang Li Yulin Normal University,

More information

Semantic Search in Portals using Ontologies

Semantic Search in Portals using Ontologies Semantic Search in Portals using Ontologies Wallace Anacleto Pinheiro Ana Maria de C. Moura Military Institute of Engineering - IME/RJ Department of Computer Engineering - Rio de Janeiro - Brazil [awallace,anamoura]@de9.ime.eb.br

More information

SCAN: A Structural Clustering Algorithm for Networks

SCAN: A Structural Clustering Algorithm for Networks SCAN: A Structural Clustering Algorithm for Networks Xiaowei Xu, Nurcan Yuruk, Zhidan Feng (University of Arkansas at Little Rock) Thomas A. J. Schweiger (Acxiom Corporation) Networks scaling: #edges connected

More information

NEW VERSION OF DECISION SUPPORT SYSTEM FOR EVALUATING TAKEOVER BIDS IN PRIVATIZATION OF THE PUBLIC ENTERPRISES AND SERVICES

NEW VERSION OF DECISION SUPPORT SYSTEM FOR EVALUATING TAKEOVER BIDS IN PRIVATIZATION OF THE PUBLIC ENTERPRISES AND SERVICES NEW VERSION OF DECISION SUPPORT SYSTEM FOR EVALUATING TAKEOVER BIDS IN PRIVATIZATION OF THE PUBLIC ENTERPRISES AND SERVICES Silvija Vlah Kristina Soric Visnja Vojvodic Rosenzweig Department of Mathematics

More information

A Study of Web Log Analysis Using Clustering Techniques

A Study of Web Log Analysis Using Clustering Techniques A Study of Web Log Analysis Using Clustering Techniques Hemanshu Rana 1, Mayank Patel 2 Assistant Professor, Dept of CSE, M.G Institute of Technical Education, Gujarat India 1 Assistant Professor, Dept

More information

Cloud Computing is NP-Complete

Cloud Computing is NP-Complete Working Paper, February 2, 20 Joe Weinman Permalink: http://www.joeweinman.com/resources/joe_weinman_cloud_computing_is_np-complete.pdf Abstract Cloud computing is a rapidly emerging paradigm for computing,

More information

A comparative study of social network analysis tools

A comparative study of social network analysis tools Membre de Membre de A comparative study of social network analysis tools David Combe, Christine Largeron, Előd Egyed-Zsigmond and Mathias Géry International Workshop on Web Intelligence and Virtual Enterprises

More information

MALLET-Privacy Preserving Influencer Mining in Social Media Networks via Hypergraph

MALLET-Privacy Preserving Influencer Mining in Social Media Networks via Hypergraph MALLET-Privacy Preserving Influencer Mining in Social Media Networks via Hypergraph Janani K 1, Narmatha S 2 Assistant Professor, Department of Computer Science and Engineering, Sri Shakthi Institute of

More information

An Analysis of Missing Data Treatment Methods and Their Application to Health Care Dataset

An Analysis of Missing Data Treatment Methods and Their Application to Health Care Dataset P P P Health An Analysis of Missing Data Treatment Methods and Their Application to Health Care Dataset Peng Liu 1, Elia El-Darzi 2, Lei Lei 1, Christos Vasilakis 2, Panagiotis Chountas 2, and Wei Huang

More information

131-1. Adding New Level in KDD to Make the Web Usage Mining More Efficient. Abstract. 1. Introduction [1]. 1/10

131-1. Adding New Level in KDD to Make the Web Usage Mining More Efficient. Abstract. 1. Introduction [1]. 1/10 1/10 131-1 Adding New Level in KDD to Make the Web Usage Mining More Efficient Mohammad Ala a AL_Hamami PHD Student, Lecturer m_ah_1@yahoocom Soukaena Hassan Hashem PHD Student, Lecturer soukaena_hassan@yahoocom

More information

Extracting Information from Social Networks

Extracting Information from Social Networks Extracting Information from Social Networks Aggregating site information to get trends 1 Not limited to social networks Examples Google search logs: flu outbreaks We Feel Fine Bullying 2 Bullying Xu, Jun,

More information

Three Effective Top-Down Clustering Algorithms for Location Database Systems

Three Effective Top-Down Clustering Algorithms for Location Database Systems Three Effective Top-Down Clustering Algorithms for Location Database Systems Kwang-Jo Lee and Sung-Bong Yang Department of Computer Science, Yonsei University, Seoul, Republic of Korea {kjlee5435, yang}@cs.yonsei.ac.kr

More information

DATA ANALYSIS IN PUBLIC SOCIAL NETWORKS

DATA ANALYSIS IN PUBLIC SOCIAL NETWORKS International Scientific Conference & International Workshop Present Day Trends of Innovations 2012 28 th 29 th May 2012 Łomża, Poland DATA ANALYSIS IN PUBLIC SOCIAL NETWORKS Lubos Takac 1 Michal Zabovsky

More information

Evaluating Online Payment Transaction Reliability using Rules Set Technique and Graph Model

Evaluating Online Payment Transaction Reliability using Rules Set Technique and Graph Model Evaluating Online Payment Transaction Reliability using Rules Set Technique and Graph Model Trung Le 1, Ba Quy Tran 2, Hanh Dang Thi My 3, Thanh Hung Ngo 4 1 GSR, Information System Lab., University of

More information

Outline. NP-completeness. When is a problem easy? When is a problem hard? Today. Euler Circuits

Outline. NP-completeness. When is a problem easy? When is a problem hard? Today. Euler Circuits Outline NP-completeness Examples of Easy vs. Hard problems Euler circuit vs. Hamiltonian circuit Shortest Path vs. Longest Path 2-pairs sum vs. general Subset Sum Reducing one problem to another Clique

More information

Chapter-1 : Introduction 1 CHAPTER - 1. Introduction

Chapter-1 : Introduction 1 CHAPTER - 1. Introduction Chapter-1 : Introduction 1 CHAPTER - 1 Introduction This thesis presents design of a new Model of the Meta-Search Engine for getting optimized search results. The focus is on new dimension of internet

More information

Web Browsing Quality of Experience Score

Web Browsing Quality of Experience Score Web Browsing Quality of Experience Score A Sandvine Technology Showcase Contents Executive Summary... 1 Introduction to Web QoE... 2 Sandvine s Web Browsing QoE Metric... 3 Maintaining a Web Page Library...

More information

A Brief Survey on Anonymization Techniques for Privacy Preserving Publishing of Social Network Data

A Brief Survey on Anonymization Techniques for Privacy Preserving Publishing of Social Network Data A Brief Survey on Anonymization Techniques for Privacy Preserving Publishing of Social Network Data Bin Zhou School of Computing Science Simon Fraser University, Canada bzhou@cs.sfu.ca Jian Pei School

More information

Analysis of Internet Topologies

Analysis of Internet Topologies Analysis of Internet Topologies Ljiljana Trajković ljilja@cs.sfu.ca Communication Networks Laboratory http://www.ensc.sfu.ca/cnl School of Engineering Science Simon Fraser University, Vancouver, British

More information

Six Degrees of Separation in Online Society

Six Degrees of Separation in Online Society Six Degrees of Separation in Online Society Lei Zhang * Tsinghua-Southampton Joint Lab on Web Science Graduate School in Shenzhen, Tsinghua University Shenzhen, Guangdong Province, P.R.China zhanglei@sz.tsinghua.edu.cn

More information

Network Analysis. BCH 5101: Analysis of -Omics Data 1/34

Network Analysis. BCH 5101: Analysis of -Omics Data 1/34 Network Analysis BCH 5101: Analysis of -Omics Data 1/34 Network Analysis Graphs as a representation of networks Examples of genome-scale graphs Statistical properties of genome-scale graphs The search

More information

SOCIAL NETWORK ANALYSIS EVALUATING THE CUSTOMER S INFLUENCE FACTOR OVER BUSINESS EVENTS

SOCIAL NETWORK ANALYSIS EVALUATING THE CUSTOMER S INFLUENCE FACTOR OVER BUSINESS EVENTS SOCIAL NETWORK ANALYSIS EVALUATING THE CUSTOMER S INFLUENCE FACTOR OVER BUSINESS EVENTS Carlos Andre Reis Pinheiro 1 and Markus Helfert 2 1 School of Computing, Dublin City University, Dublin, Ireland

More information

Analysis of an Outpatient Consultation Network in a Veterans Administration Health Care System Hospital.

Analysis of an Outpatient Consultation Network in a Veterans Administration Health Care System Hospital. Analysis of an Outpatient Consultation Network in a Veterans Administration Health Care System Hospital. Alon Ben-Ari. December 8, 2015 Introduction Many healtcare organizations face the challenge of scaling

More information

Multi-layer Structure of Data Center Based on Steiner Triple System

Multi-layer Structure of Data Center Based on Steiner Triple System Journal of Computational Information Systems 9: 11 (2013) 4371 4378 Available at http://www.jofcis.com Multi-layer Structure of Data Center Based on Steiner Triple System Jianfei ZHANG 1, Zhiyi FANG 1,

More information

Distributed Algorithms for the Placement of Network Services

Distributed Algorithms for the Placement of Network Services Distributed Algorithms for the Placement of Networ Services Todd Sproull and Roger D. Chamberlain Computer Science and Engineering, Washington University in St. Louis, St. Louis, Missouri, USA Abstract

More information

Parallel Algorithms for Small-world Network. David A. Bader and Kamesh Madduri

Parallel Algorithms for Small-world Network. David A. Bader and Kamesh Madduri Parallel Algorithms for Small-world Network Analysis ayssand Partitioning atto g(s (SNAP) David A. Bader and Kamesh Madduri Overview Informatics networks, small-world topology Community Identification/Graph

More information

Web Mining using Artificial Ant Colonies : A Survey

Web Mining using Artificial Ant Colonies : A Survey Web Mining using Artificial Ant Colonies : A Survey Richa Gupta Department of Computer Science University of Delhi ABSTRACT : Web mining has been very crucial to any organization as it provides useful

More information

Understanding the evolution dynamics of internet topology

Understanding the evolution dynamics of internet topology Understanding the evolution dynamics of internet topology Shi Zhou* University College London, Adastral Park Campus, Ross Building, Ipswich, IP5 3RE, United Kingdom Received 2 December 2005; revised manuscript

More information

Using Data Mining for Mobile Communication Clustering and Characterization

Using Data Mining for Mobile Communication Clustering and Characterization Using Data Mining for Mobile Communication Clustering and Characterization A. Bascacov *, C. Cernazanu ** and M. Marcu ** * Lasting Software, Timisoara, Romania ** Politehnica University of Timisoara/Computer

More information

A self-growing Bayesian network classifier for online learning of human motion patterns. Title

A self-growing Bayesian network classifier for online learning of human motion patterns. Title Title A self-growing Bayesian networ classifier for online learning of human motion patterns Author(s) Chen, Z; Yung, NHC Citation The 2010 International Conference of Soft Computing and Pattern Recognition

More information

PartJoin: An Efficient Storage and Query Execution for Data Warehouses

PartJoin: An Efficient Storage and Query Execution for Data Warehouses PartJoin: An Efficient Storage and Query Execution for Data Warehouses Ladjel Bellatreche 1, Michel Schneider 2, Mukesh Mohania 3, and Bharat Bhargava 4 1 IMERIR, Perpignan, FRANCE ladjel@imerir.com 2

More information

Random graphs with a given degree sequence

Random graphs with a given degree sequence Sourav Chatterjee (NYU) Persi Diaconis (Stanford) Allan Sly (Microsoft) Let G be an undirected simple graph on n vertices. Let d 1,..., d n be the degrees of the vertices of G arranged in descending order.

More information

Network/Graph Theory. What is a Network? What is network theory? Graph-based representations. Friendship Network. What makes a problem graph-like?

Network/Graph Theory. What is a Network? What is network theory? Graph-based representations. Friendship Network. What makes a problem graph-like? What is a Network? Network/Graph Theory Network = graph Informally a graph is a set of nodes joined by a set of lines or arrows. 1 1 2 3 2 3 4 5 6 4 5 6 Graph-based representations Representing a problem

More information

Predict the Popularity of YouTube Videos Using Early View Data

Predict the Popularity of YouTube Videos Using Early View Data 000 001 002 003 004 005 006 007 008 009 010 011 012 013 014 015 016 017 018 019 020 021 022 023 024 025 026 027 028 029 030 031 032 033 034 035 036 037 038 039 040 041 042 043 044 045 046 047 048 049 050

More information

Exploring Big Data in Social Networks

Exploring Big Data in Social Networks Exploring Big Data in Social Networks virgilio@dcc.ufmg.br (meira@dcc.ufmg.br) INWEB National Science and Technology Institute for Web Federal University of Minas Gerais - UFMG May 2013 Some thoughts about

More information

Real vs. Synthetic Web Performance Measurements, a Comparative Study

Real vs. Synthetic Web Performance Measurements, a Comparative Study Real vs. Synthetic Web Performance Measurements, a Comparative Study By John Bartlett and Peter Sevcik December 2004 Enterprises use today s Internet to find customers, provide them information, engage

More information

Improving Developer Activity Metrics with Issue Tracking Annotations

Improving Developer Activity Metrics with Issue Tracking Annotations Improving Developer Activity s with Issue Tracking Annotations Andrew Meneely, Mackenzie Corcoran, Laurie Williams North Carolina State University {apmeneel, mhcorcor, lawilli3}@ncsu.edu ABSTRACT Understanding

More information

So today we shall continue our discussion on the search engines and web crawlers. (Refer Slide Time: 01:02)

So today we shall continue our discussion on the search engines and web crawlers. (Refer Slide Time: 01:02) Internet Technology Prof. Indranil Sengupta Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur Lecture No #39 Search Engines and Web Crawler :: Part 2 So today we

More information

CSC2420 Fall 2012: Algorithm Design, Analysis and Theory

CSC2420 Fall 2012: Algorithm Design, Analysis and Theory CSC2420 Fall 2012: Algorithm Design, Analysis and Theory Allan Borodin November 15, 2012; Lecture 10 1 / 27 Randomized online bipartite matching and the adwords problem. We briefly return to online algorithms

More information

Comparison of Non-linear Dimensionality Reduction Techniques for Classification with Gene Expression Microarray Data

Comparison of Non-linear Dimensionality Reduction Techniques for Classification with Gene Expression Microarray Data CMPE 59H Comparison of Non-linear Dimensionality Reduction Techniques for Classification with Gene Expression Microarray Data Term Project Report Fatma Güney, Kübra Kalkan 1/15/2013 Keywords: Non-linear

More information

Evaluating partitioning of big graphs

Evaluating partitioning of big graphs Evaluating partitioning of big graphs Fredrik Hallberg, Joakim Candefors, Micke Soderqvist fhallb@kth.se, candef@kth.se, mickeso@kth.se Royal Institute of Technology, Stockholm, Sweden Abstract. Distributed

More information

A SOCIAL NETWORK ANALYSIS APPROACH TO ANALYZE ROAD NETWORKS INTRODUCTION

A SOCIAL NETWORK ANALYSIS APPROACH TO ANALYZE ROAD NETWORKS INTRODUCTION A SOCIAL NETWORK ANALYSIS APPROACH TO ANALYZE ROAD NETWORKS Kyoungjin Park Alper Yilmaz Photogrammetric and Computer Vision Lab Ohio State University park.764@osu.edu yilmaz.15@osu.edu ABSTRACT Depending

More information

BGP Prefix Hijack: An Empirical Investigation of a Theoretical Effect Masters Project

BGP Prefix Hijack: An Empirical Investigation of a Theoretical Effect Masters Project BGP Prefix Hijack: An Empirical Investigation of a Theoretical Effect Masters Project Advisor: Sharon Goldberg Adam Udi 1 Introduction Interdomain routing, the primary method of communication on the internet,

More information

EM Clustering Approach for Multi-Dimensional Analysis of Big Data Set

EM Clustering Approach for Multi-Dimensional Analysis of Big Data Set EM Clustering Approach for Multi-Dimensional Analysis of Big Data Set Amhmed A. Bhih School of Electrical and Electronic Engineering Princy Johnson School of Electrical and Electronic Engineering Martin

More information

Application of Social Network Analysis to Collaborative Team Formation

Application of Social Network Analysis to Collaborative Team Formation Application of Social Network Analysis to Collaborative Team Formation Michelle Cheatham Kevin Cleereman Information Directorate Information Directorate AFRL AFRL WPAFB, OH 45433 WPAFB, OH 45433 michelle.cheatham@wpafb.af.mil

More information

Social Media Mining. Network Measures

Social Media Mining. Network Measures Klout Measures and Metrics 22 Why Do We Need Measures? Who are the central figures (influential individuals) in the network? What interaction patterns are common in friends? Who are the like-minded users

More information

Protein Protein Interaction Networks

Protein Protein Interaction Networks Functional Pattern Mining from Genome Scale Protein Protein Interaction Networks Young-Rae Cho, Ph.D. Assistant Professor Department of Computer Science Baylor University it My Definition of Bioinformatics

More information

Effects of node buffer and capacity on network traffic

Effects of node buffer and capacity on network traffic Chin. Phys. B Vol. 21, No. 9 (212) 9892 Effects of node buffer and capacity on network traffic Ling Xiang( 凌 翔 ) a), Hu Mao-Bin( 胡 茂 彬 ) b), and Ding Jian-Xun( 丁 建 勋 ) a) a) School of Transportation Engineering,

More information

Trust Analysis of Link State Network Routing

Trust Analysis of Link State Network Routing Trust Analysis of Lin State Networ Routing Dijiang Huang Deep Medhi Cory Beard Lein Harn Abstract: Networ routing security has received more attention recently. But there are no good design guidelines

More information

Open Source Software Developer and Project Networks

Open Source Software Developer and Project Networks Open Source Software Developer and Project Networks Matthew Van Antwerp and Greg Madey University of Notre Dame {mvanantw,gmadey}@cse.nd.edu Abstract. This paper outlines complex network concepts and how

More information

Network Algorithms for Homeland Security

Network Algorithms for Homeland Security Network Algorithms for Homeland Security Mark Goldberg and Malik Magdon-Ismail Rensselaer Polytechnic Institute September 27, 2004. Collaborators J. Baumes, M. Krishmamoorthy, N. Preston, W. Wallace. Partially

More information

Structural constraints in complex networks

Structural constraints in complex networks Structural constraints in complex networks Dr. Shi Zhou Lecturer of University College London Royal Academy of Engineering / EPSRC Research Fellow Part 1. Complex networks and three key topological properties

More information

International Journal of Engineering Research-Online A Peer Reviewed International Journal Articles are freely available online:http://www.ijoer.

International Journal of Engineering Research-Online A Peer Reviewed International Journal Articles are freely available online:http://www.ijoer. RESEARCH ARTICLE SURVEY ON PAGERANK ALGORITHMS USING WEB-LINK STRUCTURE SOWMYA.M 1, V.S.SREELAXMI 2, MUNESHWARA M.S 3, ANIL G.N 4 Department of CSE, BMS Institute of Technology, Avalahalli, Yelahanka,

More information

How to Analyze Company Using Social Network?

How to Analyze Company Using Social Network? How to Analyze Company Using Social Network? Sebastian Palus 1, Piotr Bródka 1, Przemysław Kazienko 1 1 Wroclaw University of Technology, Wyb. Wyspianskiego 27, 50-370 Wroclaw, Poland {sebastian.palus,

More information

Pay Few, Influence Most: Online Myopic Network Covering

Pay Few, Influence Most: Online Myopic Network Covering Pay Few, Influence Most: Online Myopic Networ Covering K. Avrachenov 1, P. Basu 2, G. Neglia 1, B. Ribeiro 3, and D. Towsley 4 1 INRIA 2 Raytheon BBN Technologies 3 School of Computer Science 4 School

More information

SGL: Stata graph library for network analysis

SGL: Stata graph library for network analysis SGL: Stata graph library for network analysis Hirotaka Miura Federal Reserve Bank of San Francisco Stata Conference Chicago 2011 The views presented here are my own and do not necessarily represent the

More information

Part 2: Community Detection

Part 2: Community Detection Chapter 8: Graph Data Part 2: Community Detection Based on Leskovec, Rajaraman, Ullman 2014: Mining of Massive Datasets Big Data Management and Analytics Outline Community Detection - Social networks -

More information

Employer Health Insurance Premium Prediction Elliott Lui

Employer Health Insurance Premium Prediction Elliott Lui Employer Health Insurance Premium Prediction Elliott Lui 1 Introduction The US spends 15.2% of its GDP on health care, more than any other country, and the cost of health insurance is rising faster than

More information

General Network Analysis: Graph-theoretic. COMP572 Fall 2009

General Network Analysis: Graph-theoretic. COMP572 Fall 2009 General Network Analysis: Graph-theoretic Techniques COMP572 Fall 2009 Networks (aka Graphs) A network is a set of vertices, or nodes, and edges that connect pairs of vertices Example: a network with 5

More information

Problem Set 7 Solutions

Problem Set 7 Solutions 8 8 Introduction to Algorithms May 7, 2004 Massachusetts Institute of Technology 6.046J/18.410J Professors Erik Demaine and Shafi Goldwasser Handout 25 Problem Set 7 Solutions This problem set is due in

More information

Connected Identifying Codes for Sensor Network Monitoring

Connected Identifying Codes for Sensor Network Monitoring Connected Identifying Codes for Sensor Network Monitoring Niloofar Fazlollahi, David Starobinski and Ari Trachtenberg Dept. of Electrical and Computer Engineering Boston University, Boston, MA 02215 Email:

More information

On the Trade-Off between Control Plane Load and Data Plane Efficiency in Software Defined Networks

On the Trade-Off between Control Plane Load and Data Plane Efficiency in Software Defined Networks 1 Technion - Computer Science Department - Tehnical Report CS-01-0 - 01 On the Trade-Off between Control Plane Load and Data Plane Efficiency in Software Defined Networks Abstract Software Defined Networking

More information

Data Mining in Web Search Engine Optimization and User Assisted Rank Results

Data Mining in Web Search Engine Optimization and User Assisted Rank Results Data Mining in Web Search Engine Optimization and User Assisted Rank Results Minky Jindal Institute of Technology and Management Gurgaon 122017, Haryana, India Nisha kharb Institute of Technology and Management

More information